³¯ÏÊLazarus GroupʹÓÃChromeÁãÈÕÎó²îÌᳫ¹¥»÷

Ðû²¼Ê±¼ä 2024-10-28
1. ³¯ÏÊLazarus GroupʹÓÃChromeÁãÈÕÎó²îÌᳫ¹¥»÷


10ÔÂ24ÈÕ£¬£¬£¬£¬£¬³¯ÏʺڿÍ×éÖ¯Lazarus Group±»Ö¸Ê¹ÓÃGoogle ChromeµÄÏÖÒÑÐÞ²¹Çå¾²Îó²îCVE-2024-4947¾ÙÐÐÁãÈÕ¹¥»÷£¬£¬£¬£¬£¬¿ØÖÆÊÜѬȾװ±¸¡£¡£¡£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ù¹«Ë¾ÔÚ2024Äê5Ô·¢Ã÷ÁËÒ»ÌõÕë¶Ô¶íÂÞ˹¹«ÃñµÄ¹¥»÷Á´£¬£¬£¬£¬£¬¹¥»÷ͨ¹ýÐéαµÄ¼ÓÃÜÇ®±ÒÁìÓòÓÎÏ·ÍøÕ¾"detankzone[.]com"´¥·¢Îó²î¡£¡£¡£¸ÃÍøÕ¾Î±×°³ÉÈ¥ÖÐÐÄ»¯½ðÈÚ£¨DeFi£©NFTµÄ¶àÈËÔÚÏßÕ½¶·¾º¼¼³¡£¡£¡£¨MOBA£©Ì¹¿ËÓÎÏ·£¬£¬£¬£¬£¬ÊµÔò°üÀ¨Òþ²Ø¾ç±¾£¬£¬£¬£¬£¬ÔÚÓû§ä¯ÀÀÆ÷ÖÐÔËÐÐÎó²î£¬£¬£¬£¬£¬Ê¹¹¥»÷Õß»ñµÃ¶ÔÊܺ¦ÕßPCµÄÍêÈ«¿ØÖÆ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Lazarus Group»¹±»ÏÓÒÉÇÔÈ¡ÁËÒ»¿îÕýµ±Çø¿éÁ´±ßÍæ±ß׬£¨P2E£©ÓÎÏ·µÄÔ´´úÂëºÍÇ®±Ò£¬£¬£¬£¬£¬ÓÃÓÚʵÏÖÆä¹¥»÷Ä¿µÄ¡£¡£¡£¿£¿£¿£¿£¿£¿£¿¨°Í˹»ùÖ¸³ö£¬£¬£¬£¬£¬LazarusÊÇ×î»îÔ¾¡¢×îÖØ´óµÄAPT¹¥»÷ÕßÖ®Ò»£¬£¬£¬£¬£¬¾­¼ÃÀûÒæÊÇÆäÖ÷ÒªÄîÍ·£¬£¬£¬£¬£¬ÇÒÆäÕ½ÂÔÔÚÒ»Ö±Ñݱ䣬£¬£¬£¬£¬Ê¹ÓÃÌìÉúʽÈ˹¤ÖÇÄܵÈÐÂÊÖÒÕÌᳫ¸üÖØ´óµÄ¹¥»÷¡£¡£¡£


https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html


2. Fortinet FortiManager RCEÁãÈÕÎó²îÔÚÒ°ÍⱻʹÓÃ


10ÔÂ24ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Fortinet¿ËÈÕÅû¶ÁËÆäÈí¼þ²úÆ·FortiManager±£´æÒ»¸öÒªº¦ÁãÈÕÎó²î£¨CVE-2024-47575£©£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆÇëÇóÖ´ÐÐí§Òâ´úÂë»òÏÂÁ£¬£¬£¬£¬ÇÒÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¸ÃÎó²îµÄCVSS v3ÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬£¬Ó°Ïì¶à¸ö°æ±¾µÄFortiManager¼°FortiManager Cloud¡£¡£¡£FortinetÒÑÐû²¼²¹¶¡²¢ÌṩÁ˶àÖÖ½â¾öÒªÁì¡£¡£¡£¾Ý±¨¸æ£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÓÃÓÚй¶Ãô¸ÐÎļþ£¬£¬£¬£¬£¬°üÀ¨IPµØµã¡¢Æ¾Ö¤ºÍ×°±¸ÉèÖ㬣¬£¬£¬£¬µ«ÉÐδ·¢Ã÷¶ñÒâÈí¼þ»òºóÃÅ×°Öᣡ£¡£Íþв×éÖ¯UNC5820×Ô2024Äê6ÔÂ27ÈÕÆð¾ÍʹÓôËÎó²î£¬£¬£¬£¬£¬»ñÈ¡ÁËFortiGate×°±¸ÉèÖÃÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Óû§¼ÓÃÜÃÜÂ룬£¬£¬£¬£¬¿ÉÄÜÓÃÓÚ½øÒ»²½ÆÆËðºÍºáÏòÒÆ¶¯¡£¡£¡£MandiantÎÞ·¨È·¶¨¹¥»÷ÕßÉí·ÝºÍÄ¿µÄ£¬£¬£¬£¬£¬½¨ÒéËùÓÐ̻¶ÔÚ»¥ÁªÍøÉϵÄFortiManager×éÖ¯Á¬Ã¦¾ÙÐÐȡ֤ÊӲ졣¡£¡£Fortinet±Þ²ßÓû§Á¬Ã¦Éý¼¶ÖÁÇå¾²°æ±¾£¬£¬£¬£¬£¬²¢½ÓÄÉ×èֹδ֪װ±¸×¢²á¡¢Ê¹ÓÃ×Ô½ç˵֤ÊéÉí·ÝÑéÖ¤µÈ½â¾öÒªÁì¡£¡£¡£


https://cybersecuritynews.com/fortimanager-zero-day-vulnerability/#google_vignette


3. FogÓëAkiraÀÕË÷Èí¼þʹÓÃSonicWall VPNÎó²îƵÈÔÈëÇÖÆóÒµÍøÂç


10ÔÂ27ÈÕ£¬£¬£¬£¬£¬FogºÍAkiraÀÕË÷Èí¼þÔËÓªÉÌÕýÔ½À´Ô½¶àµØÊ¹ÓÃSonicWall VPNÕÊ»§ÈëÇÖÆóÒµÍøÂ磬£¬£¬£¬£¬Òªº¦Îó²îCVE-2024-40766±»ÒÔΪÊÇÆäÈëÇÖµÄÖ÷ҪͨµÀ¡£¡£¡£SonicWallÓÚ2024Äê8ÔÂÏÂÑ®ÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬µ«Ò»Öܺó±ãÖÒÑÔ³ÆÎó²îÒѱ»Æð¾¢Ê¹Óᣡ£¡£±±¼«ÀÇÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬AkiraÀÕË÷Èí¼þÁ¥Êô»ú¹¹ÒÑʹÓøÃÎó²î»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¡£¡£¾ÝArctic Wolf±¨¸æ£¬£¬£¬£¬£¬AkiraºÍFogÖÁÉÙ¾ÙÐÐÁË30´ÎÈëÇÖ£¬£¬£¬£¬£¬¾ùʼÓÚͨ¹ýSonicWall VPNÕÊ»§Ô¶³Ì»á¼û¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬75%µÄ°¸¼þÓëAkiraÓйØ£¬£¬£¬£¬£¬ÆäÓàΪFogËùΪ¡£¡£¡£ÕâÁ½¸ö×éÖ¯ËÆºõ¹²Ïí»ù´¡ÉèÊ©£¬£¬£¬£¬£¬Åú×¢ÈÔ±£´æ·ÇÕýʽÏàÖú¡£¡£¡£ËùÓб»¹¥ÆÆµÄ¶Ëµã¶¼ÔËÐÐÒ×Êܹ¥»÷µÄδÐÞ²¹°æ±¾£¬£¬£¬£¬£¬ÇÒ´ÓÈëÇÖµ½Êý¾Ý¼ÓÃܵÄʱ¼äͨ³£½Ï¶Ì£¬£¬£¬£¬£¬×î¿ì½öÐè1.5-2Сʱ¡£¡£¡£ÍþвÐÐΪÕßͨ¹ýVPN/VPS»á¼û¶Ëµã²¢»ìÏýÕæÊµIPµØµã¡£¡£¡£ÊÜѬȾ×é֯δÆôÓöàÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬Ò²Î´ÔÚĬÈ϶˿ÚÉÏÔËÐÐЧÀÍ¡£¡£¡£ÈëÇÖÀú³ÌÖУ¬£¬£¬£¬£¬ÊÓ²ìµ½ÌØ¶¨ÐÂÎÅÊÂÎñIDÅú×¢Ô¶³ÌÓû§µÇ¼ºÍIP·ÖÅÉÀֳɡ£¡£¡£ÍþвÐÐΪÕßÖ÷ÒªÕë¶ÔÐéÄâ»ú¼°Æä±¸·ÝÌᳫ¿ìËÙ¼ÓÃܹ¥»÷£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÎĵµºÍרÓÐÈí¼þ£¬£¬£¬£¬£¬µ«²»¹Ø×¢Áè¼ÝÁù¸öÔ»ò30¸öÔµÄÎļþ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/


4. BlackBastaÀÕË÷Èí¼þÐж¯Ê¹ÓÃMicrosoft Teams¾ÙÐÐÉç»á¹¤³Ì¹¥»÷


10ÔÂ25ÈÕ£¬£¬£¬£¬£¬BlackBastaÀÕË÷Èí¼þÐж¯×Ô2022Äê4ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬¶ÔÈ«ÇòÊý°ÙÆðÆóÒµ¹¥»÷ÈÏÕæ¡£¡£¡£¸Ã×é֯ͨ¹ýÎó²î¡¢ÏàÖú¡¢¶ñÒâÈí¼þ½©Ê¬ÍøÂçºÍÉç»á¹¤³ÌѧµÈ¶àÖÖÒªÁìÆÆËðÍøÂç¡£¡£¡£×î½ü£¬£¬£¬£¬£¬BlackBastaµÄÁ¥Êô»ú¹¹½«Éç»á¹¤³Ì¹¥»÷×ªÒÆµ½ÁËMicrosoft TeamsÉÏ£¬£¬£¬£¬£¬ËûÃÇðûÊÕ˾IT×ÊÖų́ÁªÏµÔ±¹¤£¬£¬£¬£¬£¬Ð­Öú½â¾öÀ¬»øÓʼþÎÊÌâ¡£¡£¡£¹¥»÷ÕßÊ×ÏÈÓõç×ÓÓʼþÑÍûԱ¹¤µÄÊÕ¼þÏ䣬£¬£¬£¬£¬È»ºóÒÔÍⲿÓû§µÄÉí·Ýͨ¹ýMicrosoft TeamsÁªÏµÔ±¹¤£¬£¬£¬£¬£¬ÕâЩÕÊ»§ÊÇÔÚEntra ID×⻧Ͻ¨ÉèµÄ£¬£¬£¬£¬£¬Ãû³Æ¿´ÆðÀ´ÏñÊÇ×ÊÖų́¡£¡£¡£ÔÚ̸ÌìÖУ¬£¬£¬£¬£¬¹¥»÷Õß·¢ËͶþάÂë»òÓÕÆ­Óû§×°ÖÃAnyDeskÔ¶³ÌÖ§³Ö¹¤¾ß»òÆô¶¯Windows Quick AssistÔ¶³Ì¿ØÖÆºÍÆÁÄ»¹²Ïí¹¤¾ß£¬£¬£¬£¬£¬ÒÔ±ãÔ¶³Ì»á¼ûÓû§µÄ¹«Ë¾×°±¸¡£¡£¡£Ò»µ©ÅþÁ¬£¬£¬£¬£¬£¬¹¥»÷Õß»á×°ÖÃÖÖÖÖÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬ÈçScreenConnect¡¢NetSupport ManagerºÍCobalt Strike£¬£¬£¬£¬£¬ÒÔÒ»Á¬Ô¶³Ì»á¼ûÓû§µÄ¹«Ë¾×°±¸£¬£¬£¬£¬£¬²¢ºáÏòÀ©É¢µ½ÆäËû×°±¸£¬£¬£¬£¬£¬Í¬Ê±ÌáÉýȨÏÞ¡¢ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬²¢×îÖÕ°²ÅÅÀÕË÷Èí¼þ¼ÓÃÜÆ÷¡£¡£¡£ReliaQuest½¨Òé×éÖ¯ÏÞÖÆMicrosoft TeamsÖÐÀ´×ÔÍⲿÓû§µÄͨѶ£¬£¬£¬£¬£¬²¢ÆôÓÃÈÕÖ¾¼Í¼ÒÔ²éÕÒ¿ÉÒÉ̸Ìì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/


5. ÑÇÂíÑ·²é·âAPT29ºÚ¿Í×éÖ¯¹¥»÷ÓòÃû


10ÔÂ25ÈÕ£¬£¬£¬£¬£¬ÑÇÂíÑ·ÒѲé·â¶íÂÞ˹APT29ºÚ¿Í×éÖ¯ÓÃÓÚÕþ¸®ºÍ¾üÊÂ×éÖ¯Õë¶ÔÐÔ¹¥»÷µÄÓòÃû¡£¡£¡£APT29£¬£¬£¬£¬£¬Óֳơ°Cozy Bear¡±ºÍ¡°Midnight Blizzard¡±£¬£¬£¬£¬£¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾ÖÓÐÁªÏµ£¬£¬£¬£¬£¬ÉÆÓÚʹÓÃÍøÂç´¹ÂںͶñÒâÈí¼þÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£´Ë´Î¹¥»÷ÖУ¬£¬£¬£¬£¬APT29ͨ¹ýαװ³ÉAWSÓòÃûµÄÍøÂç´¹ÂÚÒ³Ãæ£¬£¬£¬£¬£¬ÓÕÆ­Ä¿µÄÏàÐŲ¢Ê¹ÓöñÒâÔ¶³Ì×ÀÃæÐ­ÒéÅþÁ¬Îļþ£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Windowsƾ֤ºÍÊý¾Ý¡£¡£¡£Ö»¹ÜÑÇÂíÑ·³ÎÇåÆäÔÆÆ½Ì¨²¢·ÇÖ±½ÓÄ¿µÄ£¬£¬£¬£¬£¬µ«ÈÔÁ¬Ã¦Æô¶¯Á˲é·âð³äAWSÓòÃûµÄ³ÌÐò¡£¡£¡£APT29ÒԸ߶ÈÖØ´óµÄ¹¥»÷ÖøÃû£¬£¬£¬£¬£¬Õë¶ÔÈ«ÇòÕþ¸®¡¢ÖÇ¿âºÍÑо¿»ú¹¹£¬£¬£¬£¬£¬ÇÒ×î½ü»î¶¯¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬°üÀ¨Ïò¸ü¶àÄ¿µÄ·¢ËÍÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£ÎÚ¿ËÀ¼ÅÌËã»úÓ¦¼±·´Ó¦Ð¡×éÒ²Ðû²¼ÁËÏà¹ØÖÒÑÔ£¬£¬£¬£¬£¬²¢½¨Òé½ÓÄɶàÏî²½·¥ïÔÌ­¹¥»÷Ãæ£¬£¬£¬£¬£¬Èç×èÖ¹¡°.rdp¡±Îļþ¡¢ÏÞÖÆRDPÅþÁ¬µÈ¡£¡£¡£APT29ÈÔÊǶíÂÞ˹×îǿʢµÄÍøÂçÍþв֮һ£¬£¬£¬£¬£¬ÒÑÍùÒ»ÄêÖÐÔøÈëÇÖ¶à¸öÖ÷ÒªÈí¼þ¹©Ó¦ÉÌ£¬£¬£¬£¬£¬²¢Ê¹ÓÃЧÀÍÆ÷Îó²îÈëÇÖÈ«ÇòÖ÷Òª×éÖ¯¡£¡£¡£


https://www.bleepingcomputer.com/news/security/amazon-seizes-domains-used-in-rogue-remote-desktop-campaign-to-steal-data/


6. RansomHubºÚ¿Í×éÖ¯Éù³Æ¶ÔÄ«Î÷¸ç13¸ö»ú³¡ÔËÓªÉÌÌᳫ¹¥»÷


10ÔÂ26ÈÕ£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯RansomHub×î½üÉù³Æ¶ÔÄ«Î÷¸ç13¸ö»ú³¡ÔËÓªÉÌGrupo Aeroportuario del Centro Norte£¨OMA£©µÄÍøÂç¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢ÍþвÈôÊDz»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬½«Ð¹Â¶3TB±»µÁÊý¾Ý¡£¡£¡£OMAÔËÓª×ÅÄ«Î÷¸çÖв¿ºÍ±±²¿µØÇøµÄ»ú³¡£¬£¬£¬£¬£¬½ñÄêÒѽӴý³¬1900ÍòÃûÂÿ͡£¡£¡£´Ë´ÎÍøÂçÊÂÎñÆÈʹOMAתÏò±¸ÓÃϵͳÒÔά³ÖÔËÓª£¬£¬£¬£¬£¬µ«ÏÔʾº½°àº½Õ¾Â¥Î»ÖÃµÄÆÁÄ»ÈÔÎÞ·¨Ê¹Óᣡ£¡£OMAÌåÏÖÕýÔÚÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÊÓ²ìÊÂÎñ¹æÄ££¬£¬£¬£¬£¬²¢ÒÑÖð²½»Ö¸´Ä³Ð©Ð§ÀÍ£¬£¬£¬£¬£¬µ«¶Ô¹«Ë¾ÔËÓªºÍ²ÆÎñ״̬δÔì³ÉÖØ´óµ¹ÔËÓ°Ïì¡£¡£¡£Î¢Èí±¾ÖÜÖ¸³ö£¬£¬£¬£¬£¬RansomHubÈÔÊÇÀÕË÷Èí¼þÁìÓò×î»îÔ¾µÄÍþв֮һ£¬£¬£¬£¬£¬¶à¸öÆäËûÍþвÐÐΪÕßÒ²¼ÌÐøÊ¹ÓÃÆä¶ñÒâÈí¼þ¾ÙÐй¥»÷¡£¡£¡£


https://therecord.media/ransomhub-gang-behind-attack-mexican-airport-operator